(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

Provisioning system actions correlation with timestamps of changed files to discover ISV software

Publishing Venue

Abstract

Provisioning system actions correlation with timestamps of changed files to discover ISV software

Country

Undisclosed

Language

English (United States)

This text was extracted from a PDF file.

This is the abbreviated version, containing approximately
59% of the total text.

Page 01 of 3

Provisioning system actions correlation with timestamps of changed files to discover ISV software

Current solutions for software asset management depend on manual human work to create high quality software catalog that can be used for software recognition . Disclosed idea allows automatic generation of high quality raw data by using integration with provisioning solution, which can be used to automatically create software discovery catalog content.

The proposal is to leverage integration with software provisioning solution , which installs software onto endpoints. Such solution while executing the deployment /install action can provide time frame and endpoint ID , so based on that we are able to tell where and when was given software installed . We can scan the file system of the target endpoint and using "time created / modified" meta information create a set of raw data, which consists of file names, sizes and paths for all files that were created in that time window. Based on that raw data, we can suggest highly accurate signature for installed software, which once accepted by the SAM administrator , will be used on all the endpoints in the environment to discover that software .

The main idea is to leverage the additional information about time of software deployment which can be provided by provisioning solution to gather relevant raw data , which can be used to automatically create software inventory signatures . Provisioning solution when it runs action/t...